Listing Thumbnail

    Proofpoint Security

     Info
    Sold by: Proofpoint 
    Deployed on AWS
    Vendor Insights
    The leader in Human-Centric cybersecurity. 87 of the Fortune 100 trust Proofpoint to stop human-targeted attacks, safeguard their data and make their people more resilient. It prevents today's advanced email attacks, provides actionable visibility, and automated remediation that effectively stops threats while increasing your operational efficiencies. Proofpoint helps organizations break the attack chain by protecting data, investigating insiders, and blocking cloud threats. Our platform addresses the full spectrum of data loss scenarios by providing a holistic view across channels in a cloud-native interface and combining content, behavior, and threat telemetry.
    4.6

    Overview

    Play video

    'Proofpoint People Protection Platform' is an AI-driven solution that protects your people from modern email and cloud-based threats. The solution provides actionable visibility to help you understand your attack surface - who is most attacked, what threats are targeting them, and which suppliers pose the greatest risk. These insights enable you to prioritize risk mitigation controls.

    Proofpoint empowers you to effectively protect against multiple threats - phishing, credential theft, ransomware, BEC, cloud account takeover, and compromised supplier accounts. By stopping more email security threats before they enter your organization, security teams have fewer incidents to manually triage and manage. Automated remediation enables consistent, scalable incident response to sophisticated email attacks - thereby increasing the operational effectiveness of your security teams.

    'Proofpoint Information Protection Platform' prevents data loss and insider threats posed by careless, compromised and malicious employees by providing contextualized insights into content, behavior, and threats from a single cloud-native console, saving time and operational costs. As a result, organizations can defend their data, minimize financial risk and achieve operational efficiencies.

    With Proofpoint, organizations can correlate user activity and threat insights with data movement to prevent and respond to data loss incidents and insider threats in real time. Security teams can gain a holistic view of user interaction across cloud, email, endpoint, and web in a centralized dashboard. Proofpoint protects user privacy by anonymizing user data, masking content snippets and managing regional data residency.

    Learn more about Proofpoint packages: https://www.proofpoint.com/us/products/packages 

    For pricing plans above 500 users, please reach out to: aws-sales@proofpoint.com 

    We recommend purchasing Proofpoint solutions via Private Offers. Please contact us at: <www.proofpoint.com/awsmarketplace >

    Highlights

    • Unparalleled Efficacy & Visibility - Detect more threats more accurately; Know who is being attacked and how.
    • Unified Context - Gain context between data, behavior and threats. Understand user interaction across cloud, email, endpoint, and web.
    • Operational Efficiency - Reduce your team's workload; Streamline investigations while maintaining user privacy.

    Details

    Delivery method

    Deployed on AWS
    New

    Introducing multi-product solutions

    You can now purchase comprehensive solutions tailored to use cases and industries.

    Multi-product solutions

    Features and programs

    Vendor Insights

     Info
    Skip the manual risk assessment. Get verified and regularly updated security info on this product with Vendor Insights.
    Security credentials achieved
    (1)

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Proofpoint Security

     Info
    Pricing is based on the duration and terms of your contract with the vendor. This entitles you to a specified quantity of use for the contract duration. If you choose not to renew or replace your contract before it ends, access to these entitlements will expire.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    12-month contract (2)

     Info
    Dimension
    Description
    Cost/12 months
    People Protection
    500 users: Core (P0) email security package
    $96,000.00
    Information Protection
    500 users: DLP Transform (incl. endpoint DLP, cloud DLP, SaaS isolation, ITM)
    $176,000.00

    Vendor refund policy

    All orders are non-cancellable and all fees and other amounts that you pay are non-refundable. If you have purchased a multi-year subscription, you agree to pay the annual fees due for each year of the multi-year subscription term.

    Custom pricing options

    Request a private offer to receive a custom quote.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Support

    Vendor support

    Pre-sales email support is offered Monday-Friday during normal business hours (aws-sales@proofpoint.com ) EMEA: +44 141 471 9131 | APAC: +61 1800 450 452 | US: +1 408 752 5432

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly
    By Proofpoint
    By Check Point Software Technologies

    Accolades

     Info
    Top
    10
    In Data Security and Governance

    Customer reviews

     Info
    Sentiment is AI generated from actual customer reviews on AWS and G2
    Reviews
    Functionality
    Ease of use
    Customer service
    Cost effectiveness
    0 reviews
    Insufficient data
    Insufficient data
    Insufficient data
    Insufficient data
    Positive reviews
    Mixed reviews
    Negative reviews

    Overview

     Info
    AI generated from product descriptions
    AI-Driven Threat Detection
    Utilizes artificial intelligence to detect and prevent advanced email attacks, phishing, credential theft, ransomware, business email compromise, and cloud account takeover threats.
    Unified Cross-Channel Visibility
    Provides centralized dashboard with holistic view of user interaction and threat telemetry across cloud, email, endpoint, and web channels in a cloud-native interface.
    Automated Incident Response
    Enables automated remediation and consistent, scalable incident response to sophisticated email attacks with reduced manual triage requirements.
    Behavioral and Content Analysis
    Correlates user activity, behavior patterns, and content analysis with threat intelligence and data movement to identify and prevent data loss and insider threats in real time.
    Data Protection and Privacy Controls
    Implements anonymization of user data, content snippet masking, and regional data residency management to protect user privacy while defending against data loss scenarios.
    Multi-Platform Email and Collaboration Security
    Defense-in-depth security for Microsoft 365 and G-Suite, extending to collaboration environments including file sharing, chat, Slack, and Microsoft Teams
    Advanced Threat Detection and Sandboxing
    Advanced sandboxing and active-content analysis to scan files for malicious content and prevent phishing and malware propagation
    Data Loss Prevention with Context-Aware Policies
    Identification of confidential information with context-aware policy enforcement to prevent unauthorized data leakage of PCI, HIPAA, PII, and other protected content
    Comprehensive Email Scanning
    Scanning of inbound, outbound, and internal email traffic with threat quarantine capabilities before user download
    Cloud-Native Deployment
    One-click, cloud-enabled deployment without requiring proxy, appliance, or endpoint agent installation
    AI-Powered Threat Detection and Response
    Leverages AI engine to detect and block phishing, malware, ransomware, spear phishing, spam, and account takeover threats with both cloud email gateway and API-based inbox defense mechanisms.
    DMARC Authentication and Reporting
    Provides DMARC reporting with granular visibility and analysis of SPF/DKIM/DMARC configurations to prevent email domain fraud and spoofing while minimizing false positives.
    Post-Delivery Threat Hunting and Incident Response
    Enables threat hunting and incident response capabilities with automated malicious message removal and customizable response playbooks for post-delivery threat management.
    Anomalous Behavior Detection for Account Takeover Prevention
    Detects anomalous email behavior to identify compromised accounts and automatically removes fraudulent emails and malicious payloads sent from compromised accounts.
    Dual-Layer Email Protection Architecture
    Combines cloud email gateway and API-based inbox defense to provide pre- and post-delivery email security across multiple protection layers.

    Security credentials

     Info
    Validated by AWS Marketplace
    FedRAMP
    GDPR
    HIPAA
    ISO/IEC 27001
    PCI DSS
    SOC 2 Type 2
    -
    -
    -
    -
    -
    No security profile
    No security profile

    Contract

     Info
    Standard contract
    No
    No
    No

    Customer reviews

    Ratings and reviews

     Info
    4.6
    582 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    76%
    22%
    1%
    0%
    1%
    0 AWS reviews
    |
    582 external reviews
    External reviews are from G2  and PeerSpot .
    reviewer2801907

    Intelligent data policies have stopped insider threats and protect sensitive emails and USB copies

    Reviewed on Feb 10, 2026
    Review provided by PeerSpot

    What is our primary use case?

    Proofpoint Enterprise DLP  depends upon an organization and what kind of organization it is. For example, if you are working for the healthcare industry, the intellectual property, confidential information, or PII includes health records numbers, personal details, account numbers, passport details, and social security numbers. When you take the service of Proofpoint Enterprise DLP , we first identify what our requirement is. If I was working for one of the banking solutions in Australia, their social security number is definitely there, as well as their passport. It depends upon the location. For the India location, we have the UID and Aadhaar identification. For Australia in the healthcare industry, they have HIPAA (Health Insurance Portability and Accountability Act), claim records, claim details, medical record numbers (MRN), and tax details numbers. All these things are required to protect.

    When anyone is trying to send all this information outside, Proofpoint Enterprise DLP  provides the solution. We have created rules using Proofpoint Enterprise DLP  so that whenever any user is trying to send any emails externally, we capture the keyword from the email body. The system will scan the email, and if that keyword is identified within the DLP solution with the rules we have incorporated, it will generate an alert. The email will be moved to the DLP quarantine folder. A user will receive an automated email or response stating that they are trying to send confidential information outside of the organization, and this has been blocked due to DLP policy. An analyst will create a ticket into our solution, and then the analyst will review that incident and start investigating.

    Let's say you're working for the electronics industry, and they have taken Proofpoint Enterprise DLP. For any electronics industry, they work in a situation where they want to protect the circuit design of any one of the latest or newly launched electrical or electronic devices. That electrical circuit design is a patent for them. They don't want to send this to an outside organization. The email will be scanned for the circuit design and patent information. If, for example, there is a project manager who wants to send one of the electronic circuit designs using VLSI technology and has worked for ten years in the organization and is now leaving, they want to send that patent information since they have created it, they will try to send it outside of the organization. In that case, the system will capture the alert, create an alert for that, and then the investigation starts.

    Let's say there is a user who has recently resigned from the organization due to some conflict or issues. Now they want to send important intellectual property, intellectual documents, or confidential information outside of the organization. In that case, Proofpoint Enterprise DLP works in the backend, triggers an alert, and starts the investigation.

    What is most valuable?

    Proofpoint Enterprise DLP is a unified solution that does not work for inbound email but only works for outbound email. It can protect everything by scanning for the email and searching for specific criteria. If that criteria is matched, it can create an alert and take actions accordingly. It's easy to perform all those activities on Proofpoint Enterprise DLP.

    Data loss prevention is very easy if you take the service from Proofpoint Enterprise DLP. Proofpoint Enterprise DLP works in the direction of what an organization wants to protect. It's easy to create rules and email firewall rules for outbound emails. While creating that rule, we can easily capture that and protect that. We can protect the important information from going outside the organization. It's very easy to identify all those things.

    Proofpoint Enterprise DLP is already an AI-based solution that has taken features from AI from the backend for identifying, investigation, or correlations of all the solutions. The AI and machine learning work in the backend to identify these things.

    One thing to highlight is that when a user is trying to send emails, rather than sending the data through email, if they insert a USB drive and start copying files within that USB drive, irrespective of the email communication, Proofpoint Enterprise DLP can also trigger an alert for that, indicating that a USB device was inserted for that specific host. That can be one of the best features for Proofpoint Enterprise DLP.

    What needs improvement?

    From a DLP product improvement point of view, I think if Proofpoint Enterprise DLP can provide a deep-dive investigation or user activity listed on the alert sections with details about what activity was performed by the users at the time of the alert, what checks were performed, whether any rule was created, any SharePoint  was accessed, any confidential SharePoint  was accessed, or any established connection was performed, this information would be helpful. If that information was also tagged or shown on the ticket, it would be easier to understand more details or investigation approaches and investigation concepts. If that feature can be possible from the vendor side, it will help us for the investigation and as an improvement.

    For how long have I used the solution?

    I have used this solution for four to six years.

    What do I think about the stability of the solution?

    The performance stability is very good. We can see the health status every day on Proofpoint Enterprise DLP. Whenever any node is down or whenever any service CPU utilization is high, we can easily review that in the console, the PROOF console, TRAP console, or health status report. It's easy for us to identify any issues.

    Which solution did I use previously and why did I switch?

    I had worked with Symantec and Symantec Vault for DLP solutions. That was not very good because they don't have customization features. You could only use limited tabs with minimal customization features.

    How was the initial setup?

    It's easy for the deployment. We can easily configure that email firewall rules and information protection rules.

    What about the implementation team?

    Creating a policy is not very difficult for us for Proofpoint Enterprise DLP. Sometimes we usually take help from Proofpoint customer or professional support services. They provide guidance on what and how we can create those policies, and that saves time in deployment and configurations. We can easily get help from Proofpoint customer support or professional support, and it would be easy to create the rule logic and the policy deployment.

    What was our ROI?

    For the DLP, the important thing is that the response time is very quick. The actions taken are immediate. The quarantine time and response time are efficient. When the email is getting quarantined, we can hold that in the quarantine folder for some time, such as for one month. The analyst can review, investigate, and take actions accordingly.

    What's my experience with pricing, setup cost, and licensing?

    Proofpoint Enterprise DLP is generally a high-pricing solution, so it generally requires additional licenses for the DLP. If you are a regular customer, then you only have the email protection and email firewall, not for the information protection solution. You need to specify and provide the license, and then accordingly you should go ahead with the DLP activities.

    Which other solutions did I evaluate?

    Other solutions include CrowdStrike, Telstra, Akamai , Microsoft Office 365 , SIEM  tools, HP ArcSight, and Azure .

    What other advice do I have?

    Proofpoint Enterprise DLP works in the synchronization of Proofpoint Production on Demand and Proofpoint IMD, which is the Internal Mail Defense solution. When any user account gets compromised or an attacker gains access to an internal user account, they will pretend to be an insider threat and start moving confidential information outside of the organization. In that case, Proofpoint Enterprise DLP plays a very important role in easily identifying all these activities from the backend, using machine learning and advanced analytics. UEBA , which is User and Entity Behavior Analytics , performs checks on the user's day-to-day activity on the backend side. It examines what is the daily routine timing, what the user is trying to do every day, and how it is different from some specific day. Based on all those things, it correlates, it identifies, and based on machine learning, it becomes very easy for the DLP solution to take decisions. It's a very good solution in terms of preventing or protecting from DLP incidents.

    I think organizations should go ahead with Proofpoint Enterprise DLP. Every day they are coming with more advanced features, more scalability, and more upgraded versions. I would rate this solution as an eight out of ten.

    reviewer2784738

    Email defenses have reduced phishing impact and save our soc team significant investigation time

    Reviewed on Dec 04, 2025
    Review provided by PeerSpot

    What is our primary use case?

    Proofpoint Enterprise Data Loss Prevention (DLP)  is currently being used in parts. The email protection plan is used, though uncertainty exists about whether an added-on plan for the DLP specifically is included.

    When first joined, Proofpoint was in the early phases of deployment and was told it was pretty straightforward, especially with the services they provide, such as white glove service. They respond quickly to questions.

    What is most valuable?

    The product does a pretty good job filtering out promotional emails and unwanted emails. It effectively filters specific vendors sending out mass mails, not just spam. For important emails, it catches scripts in emails and does a double check on those. Many things noticed over time have been positive, especially the impact on the SOC team, who state that it saves a lot of time and catches phishing attempts early, specifically very custom phishing.

    What needs improvement?

    Proofpoint Enterprise Data Loss Prevention (DLP) should probably add something more into their case management process. There are certain things that Proofpoint lacks regarding case management. When incidents come in, it classifies a specific subcategory of what that incident is and creates a ticket for the SOC team. If they could provide more details on the type of incident filing in case management, that would be helpful. This is a hard ask because it requires some form of backend automation workflow. Many tools are starting to adopt their own automation workflows, which is pretty cool.

    Occasional mishaps arise related to users' devices affected by Proofpoint or when Proofpoint isn't logging specific device actions. The insider risk tool has been utilized effectively, which monitors employee actions every ten seconds, but there have been mishaps. Additionally, there are moments when specific servers require updates due to mismatched deployment updates, though this is not considered difficult because endpoint engineering counterparts assist, especially during Proofpoint calls.

    For how long have I used the solution?

    I have utilized Proofpoint Enterprise Data Loss Prevention (DLP)  for approximately five years.

    What do I think about the stability of the solution?

    There was one instance of instability related to a phishing alarm connected to Outlook. It was not major and nothing caused significant downtime within the systems or applications.

    What do I think about the scalability of the solution?

    Proofpoint Enterprise Data Loss Prevention (DLP) is pretty scalable. The full scalability phase has not been reached yet, as efforts are being made to formalize processes due to frequent M&As. The aim is to have new companies adhere to the same tools. So far, no issues have been encountered, particularly with the smaller companies acquired.

    How are customer service and support?

    Technical support was contacted via a ticket and they were pretty responsive. Whenever issues arose, the team reached out and a specific TAM stayed on top of it. Initially, tickets were submitted and emails were sent, and the TAM would respond quickly, involving the right people for the tasks.

    The quality of their answers is good. Issues have not really been experienced with this specific vendor regarding their responses. They are technical and provide options that help narrow down solutions.

    How would you rate customer service and support?

    Positive

    How was the initial setup?

    For the deployment of Proofpoint Enterprise Data Loss Prevention (DLP), currently about three people are dedicated to the process or to maintenance and weekly TAM calls. The best estimate that can be given is two or three people. One individual has been observed managing one aspect of Proofpoint products on their own, and it seemed feasible to finish within a month.

    What was our ROI?

    The pricing for Proofpoint Enterprise Data Loss Prevention (DLP) is still good. When renewal occurred with Proofpoint, there were no issues with the stated price. The company works with GuidePoint Security as a VAR, which does a good job. So far, there has been no feeling of it being too expensive, which would lead to switching to another solution. Proofpoint adds value and proves its ROI based on the services they provide. Although Abnormal Security  has been pushing, the package that Proofpoint provides is better in the long run, especially since results have been seen in prevention and responses to exercises concerning external files being sent out during various departures.

    Which other solutions did I evaluate?

    Attempts have been made to use the Netskope  DLP policy, but it is bundled with whatever they offer, especially with the POP locations. Some people in the company have also looked into other solutions apart from Proofpoint, such as Abnormal Security. This is the current discussion given the many moving pieces.

    What other advice do I have?

    The overall review rating for this product is 8 out of 10.

    SImon T.

    Exceptional Usability with Immediate Risk Reduction

    Reviewed on Nov 13, 2025
    Review provided by G2
    What do you like best about the product?
    Usability,Immediate impact to risk reduction.
    What do you dislike about the product?
    I have deployed the solution three times accross three business, so there isnt anything that i dislike
    What problems is the product solving and how is that benefiting you?
    Reduction in malicuous email delivery, user interface integration for end users, and streamlining tasks
    Computer & Network Security

    Comprehensive Threat Insights for Effective Remediation.

    Reviewed on Nov 13, 2025
    Review provided by G2
    What do you like best about the product?
    Threat detail and information available for investigation and remediation
    What do you dislike about the product?
    None, product is great. Uptime is better compared to rivals
    What problems is the product solving and how is that benefiting you?
    ATOs. TOAD and other email related attacks
    Computer & Network Security

    Highly Flexible Solution Perfect for Large Organizations

    Reviewed on Nov 13, 2025
    Review provided by G2
    What do you like best about the product?
    Highly flexible, which is perfect for large organisations
    What do you dislike about the product?
    I don't believe there's anything I would dislike.
    What problems is the product solving and how is that benefiting you?
    Provides an extra layer of defence, and is truly our biggest protection against phishing emails. Attachment defense also protects us against malicious attachments. Internal DMARC policies can be fully customised to our needs, which is a great benefit when it comes to organisations consisting of multiple different companies, like ours. This for us was a huge help during acquisitions.
    View all reviews